Learn about the resource policies including API permissions.
To control who has access to Anomaly Detection, and the type of
access for each group of users, you must create policies. By default, only the users in
the Administrators group have access to all Anomaly Detection
resources.
For everyone else who's using the service, you must create policies that assign them
proper rights to Anomaly Detection resources. For a complete list
of OCI policies, see the Policy Reference.
Resource Types
Anomaly Detection offers both aggregate and individual
resource-types for writing policies. You can use aggregate resource types to write
fewer policies. For example, instead of allowing a group to manage all individual
resource types, you can have a policy that allows the group to manage the aggregate
resource type, ai-service-anomaly-detection-family.
To work with Anomaly Detection, an administrator must grant you
access in an IAM policy.
If you get a message that you donβt have permission or are unauthorized, verify with an administrator what type of access you have.
Create a policy with one of the following policies:
Copy
allow <subject> to manage ai-service-anomaly-detection-family in tenancy, where subject can be:
group <group-name> | group id <group-ocid> | dynamic-group <dynamic-group-name> | dynamic-group id <dynamic-group-ocid> | any-user
Example Policies π
Allow users to manage all Anomaly Detection resources using the
aggregate resource:
Copy
allow any-user to manage ai-service-anomaly-detection-family in tenancy
These policies control user access by theAnomaly Detection
resources:
Copy
allow any-user to manage ai-service-anomaly-detection-project in tenancy
allow any-user to manage ai-service-anomaly-detection-model in tenancy
allow any-user to manage ai-service-anomaly-detection-data-asset in tenancy
allow any-user to manage ai-service-anomaly-detection-private-endpoint in tenancy
allow any-user to manage ai-service-anomaly-detection-job in tenancy
You can use the individual resource types with API calls to interact with the
service.
The following table lists the API operations for the Anomaly Detection service in a logical order, grouped by
resource type, and the permissions required for resource
types: